In this paper, a new content-based image watermarking scheme is proposed. The Harris-Laplace detector is adopted to extract feature points, which can survive a variety of attacks. The local characteristic regions (L...In this paper, a new content-based image watermarking scheme is proposed. The Harris-Laplace detector is adopted to extract feature points, which can survive a variety of attacks. The local characteristic regions (LCRs) are adaptively constructed based on scale-space theory. Then, the LCRs are mapped to geometrically invariant space by using image normalization technique. Finally, several copies of the digital watermark are embedded into the nonoverlapped LCRs by quantizing the magnitude vectors of discrete Fourier transform (DFT) coefficients. By binding a watermark with LCR, resilience against desynchronization attacks can be readily obtained. Simulation results show that the proposed scheme is invisible and robust against various attacks which includes common signals processing and desynchronization attacks.展开更多
The healthcare IoT system is considered to be a significant and modern medical system.There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countri...The healthcare IoT system is considered to be a significant and modern medical system.There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countries.Among the major challenges preventing the fast and widespread adoption of such systems is the failure to maintain the data privacy of patients and the integrity of remote clinical diagnostics.Recently,the author proposed an end-to-end authentication scheme for healthcare IoT systems(E2EA),to provide a mutual authentication with a high data rate between the communication nodes of the healthcare IoT systems.Although the E2EA authentication scheme supports numerous attractive security services to resist various types of attack,there is an ambiguous view of the impact of the desynchronization attack on the E2EA authentication scheme.In general,the performance of the authentication scheme is considered a critical issue when evaluating the applicability of such schemes,along with the security services that can be achieved.Therefore,this paper discusses how the E2EA authentication scheme can resist the desynchronization attack through all possible attack scenarios.Additionally,the effect of the desynchronization attack on the E2EA scheme performance is analyzed in terms of its computation and communication costs,based on a comparison with the recently related authentication schemes that can prevent such attack.Moreover,this research paper finds that the E2EA authentication scheme can not only prevent the desynchronization attack,but also offers a low cost in terms of computations and communications,and can maintain consistency and synchronization between the communication nodes of the healthcare IoT systems during the next authentication sessions.展开更多
基金This work was supported by Natural Science Foundation of Liaoning Province of China (No.20032100)Open Foundation of State Key Laboratory of Vision and Auditory Information Processing (Peking University) (No.0503)+2 种基金Natural Science Foundation of Dalian City of China (No.2006J23JH020)Open Foundation of Jiangsu Province Key Laboratory for Computer Information Processing Technology (Soocbow University)(No.KJS0602)Open Foundation of Key Laboratory of Image Processing and Image Communication (Nanjing University of Posts and Communications)(No.ZK205014).
文摘In this paper, a new content-based image watermarking scheme is proposed. The Harris-Laplace detector is adopted to extract feature points, which can survive a variety of attacks. The local characteristic regions (LCRs) are adaptively constructed based on scale-space theory. Then, the LCRs are mapped to geometrically invariant space by using image normalization technique. Finally, several copies of the digital watermark are embedded into the nonoverlapped LCRs by quantizing the magnitude vectors of discrete Fourier transform (DFT) coefficients. By binding a watermark with LCR, resilience against desynchronization attacks can be readily obtained. Simulation results show that the proposed scheme is invisible and robust against various attacks which includes common signals processing and desynchronization attacks.
文摘The healthcare IoT system is considered to be a significant and modern medical system.There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countries.Among the major challenges preventing the fast and widespread adoption of such systems is the failure to maintain the data privacy of patients and the integrity of remote clinical diagnostics.Recently,the author proposed an end-to-end authentication scheme for healthcare IoT systems(E2EA),to provide a mutual authentication with a high data rate between the communication nodes of the healthcare IoT systems.Although the E2EA authentication scheme supports numerous attractive security services to resist various types of attack,there is an ambiguous view of the impact of the desynchronization attack on the E2EA authentication scheme.In general,the performance of the authentication scheme is considered a critical issue when evaluating the applicability of such schemes,along with the security services that can be achieved.Therefore,this paper discusses how the E2EA authentication scheme can resist the desynchronization attack through all possible attack scenarios.Additionally,the effect of the desynchronization attack on the E2EA scheme performance is analyzed in terms of its computation and communication costs,based on a comparison with the recently related authentication schemes that can prevent such attack.Moreover,this research paper finds that the E2EA authentication scheme can not only prevent the desynchronization attack,but also offers a low cost in terms of computations and communications,and can maintain consistency and synchronization between the communication nodes of the healthcare IoT systems during the next authentication sessions.